Create an argument on behalf of the employee

Assignment Help Management Information Sys
Reference no: EM131164943

CLOS I NG CAS E TWO

Invading Your Privacy

Can your employer invade your privacy through monitoring technologies? Numerous lawsuits have been filed by employees who believed their employer was wrong to invade their privacy with monitoring technologies. Below are a few cases highlighting lawsuits over employee privacy and employer rights to monitor.

Smyth versus Pillsbury Company

An employee was terminated for sending inappropriate and unprofessional messages over the company's email system. The company had repeatedly assured its employees that email was confidential, that it would not be intercepted, and that it would not be used as a basis for discipline or discharge. Michael Smyth retrieved, from his home computer, email sent from his supervisor over Pillsbury's email system. Smyth allegedly responded with several comments concerning the sales management staff, including a threat to "kill the backstabbing bastards" and a reference to an upcoming holiday party as "the Jim Jones Kool-aid affair."

Pillsbury intercepted the email and terminated Smyth, who then sued the company for wrongful discharge and invasion of privacy.

The court dismissed the case in 1996, finding that Smyth did not have a reasonable expectation of privacy in the contents of his email messages, despite Pillsbury's assurances, because the messages had been voluntarily communicated over the company's computer system to a second person. The court went on to find that, even if some reasonable expectation of privacy existed, that expectation was outweighed by Pillsbury's legitimate interest in preventing inappropriate or unprofessional communications over its email system.

Bourke versus Nissan Motor Corporation

While training new employees on the email system, a message sent by Bonita Bourke was randomly selected and reviewed by the company. The message turned out to be a personal email of a sexual nature. Once Bourke's email was discovered, the company decided to review the emails of the rest of Bourke's workgroup. As a result of this investigation, several other personal emails were discovered. Nissan gave the employees who had sent the personal messages written warnings for violating the company's email policy.

The disciplined employees sued Nissan for invasion of privacy. The employees argued that although they signed a form acknowledging the company's policy that company-owned hardware and software was restricted for company business use only, their expectation of privacy was reasonable because the company gave the plaintiffs passwords to access the computer system and told them to guard their passwords.

However, a California court in 1993 held that this was not an objectively reasonable expectation of privacy because the plaintiffs knew that email messages "were read from time to time by individuals other than the intended recipient."

McLaren versus Microsoft Corporation

The Texas Court of Appeals in 1999 dismissed an employee's claim that his employer's review and dissemination of email stored in the employee's workplace personal computer constituted an invasion of privacy. The employee argued that he had a reasonable expectation of privacy because the email was kept in a personal computer folder protected by a password. The court found this argument unconvincing because the email was transmitted over his employer's network.

However, according to a news account of one case, a court held that an employer's use of a supervisor's password to review an employee's email may have violated a Massachusetts state statute against interference with privacy. In that case, Burk Technology allowed employees to use the company's email system to send personal messages, but prohibited "excessive chatting." To use the email system, each employee used a password. The employer never informed employees that their messages would or could be monitored by supervisors or the company president. The president of the company reviewed the emails of two employees who had referred to him by various nicknames and discussed his extramarital affair. The two employees were fired by the company president, who claimed the terminations were for their excessive email use and not because of the messages' content. The court denied the company's attempt to dismiss the suit and allowed the matter to be set for trial on the merits. The court focused on the fact that the employees were never informed that their email could be monitored.

This case illustrates the importance of informing employees that their use of company equipment to send email and to surf the Internet is subject to monitoring to prevent subsequent confusion, and a possible future defense, on the part of employees.

Questions

1. Pick one of the preceding cases and create an argument on behalf of the employee.

2. Pick one of the preceding cases and create an argument against the employee.

3. Pick one of the preceding cases and create an argument on behalf of the employer's use of monitoring technologies.

4. Pick one of the preceding cases and create an argument against the employer's use of monitoring technologies.

Reference no: EM131164943

Questions Cloud

Describe how you spent this past weekend : Describe how you spent this past weekend. - Pay attention to tense, sentence structure and subject verb agreement.
Distributed between two normal products work and leave : Assume that an individual has 80 hours per week that can be distributed between two normal products work and leave ( leisure ) . Draw a bid curve for an individual who can earn a maximum of £ 10,000 per week if the individual does not have any leave ..
Explore the website for a texas interest group : Find and explore the website for a Texas interest group. Do a search for a subject and see if there is a group that matches.
Calculate the total potential energy for a square plate : Further, it might be pointed out that, as we shall verify later, the in-plane displacement harmonics were chosen so as to approximately satisfy the inplane equations of equilibrium.
Create an argument on behalf of the employee : Pick one of the preceding cases and create an argument on behalf of the employer's use of monitoring technologies. Pick one of the preceding cases and create an argument against the employer's use of monitoring technologies.
Write an essay on the given topic : Write an essay on the given topic- Introduce the event. This may include what happened, the reason, setting, location, timeline, outcome, and casualties.
Who has the absolute advantage in production of airplanes : Suppose the following table shows the number of labor hours needed to produce airplanes and automobiles in the united states and south korea, but one of the numbers is unknown. SK-#of hours to produce planes=2,000, produce cars=?. and US airplanes =8..
How oedipus and hamlet are good examples of tragedies : In 900 - 1200 word essay, discuss how Oedipus and Hamlet are good examples of tragedies according to Aristotle. Include quotes from Aristotle as well as two other sources included in the course.
Compare and contrast forecasting techniques : What is the mission or standard that this procedure must meet - Please ensure you use a policy and procedure template that is suitable in a business environment

Reviews

Write a Review

Management Information Sys Questions & Answers

  Implications of security breach

Important because of implications of security breach, laws governing protection of certain types of data, Web Based systems security and Internal security.

  Determine what the requirements are to obtain each credentia

Research 3 different IT certifications:   Determine what the requirements are to obtain each credential. What is the process to obtain the credential?

  Telecommunication network installation and management

When it comes to telecommunication network installation and management, as a business manager, you have to make a crucial decision to choose between hiring an expert to do the work or do it yourself.

  Discuss the cultural factors organizations

SCM Process: Discuss the cultural factors organizations must understand in order to do business on a global scale. Support your reasoning.

  Rfid internet search resultswhen you entered rfid into the

rfid internet search resultswhen you entered rfid into the internet search engine of the top twenty results how many

  Draw connections within social media and technology

draw connections within social media and technology between learning and business communication. How does the "learning" theory transfer to the networked world for business?

  A research the forms of data used in the system of your

a research the forms of data used in the system of your choice. this system could be your own health care organization

  Question about multiverse remix

Question about Multiverse Remix - The challenges of Multiverse Remix. Can you help me get started on this assignment?

  Define each component of an information system

Define each component of an information system. Define how you can use the five-component model to guide your learning and thinking about information systems.

  Discuss comment in context of growth of information systems

Discuss this comment in the context of the growth of information systems and the pivotal role they now occupy in all organisations.

  How process and business strategic decisions

How process and business strategic decisions can be made together

  Select one such agency and describe their role

The Homeland Security Act of 2002 is divided into 17 titles while bringing together under one umbrella more than 22 federal agencies. Select one such agency and describe their role and responsibilities in HLS. Which agencies do you believe they wo..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd